Preparing the U.S. Army for homeland security : concepts, issues, and options by Eric V Larson(
)14
editions published
between
2000
and
2001
in
English
and held by
2,230 WorldCat member
libraries
worldwide
Homeland security encompasses five distinct missions: domestic preparedness and civil support in case of attacks on civilians,
continuity of government, continuity of military operations, border and coastal defense, and national missile defense. This
report extensively details four of those mission areas (national missile defense having been covered in great detail elsewhere).
The authors define homeland security and its mission areas, provide a methodology for assessing homeland security response
options, and review relevant trend data for each mission area. They also assess the adequacy of the doctrine, organizations,
training, leadership, materiel, and soldier systems and provide illustrative scenarios to help clarify Army planning priorities.
The report concludes with options and recommendations for developing more cost-effective programs and recommends a planning
framework that can facilitate planning to meet homeland security needs

The economic costs and implications of high-technology hardware theft by James N Dertouzos(
)10
editions published
in
1999
in
English
and held by
2,166 WorldCat member
libraries
worldwide
This report presents the results of a study undertaken at the request of the American Electronics Association and a consortium
of high-tech industries. Based on a nine-month survey of 95 firms, representing approximately 40 percent of the sales volume
for the computer, semiconductor, hard disk drive, and cellular telephone industries, the authors estimate that direct costs
of hardware theft are almost $250 million. Indirect costs (such as lost sales and expensive theft-reduction strategies) and
industry losses could push total losses past $5 billion. Industry and consumers share the price of high-tech losses, but firms
do not always have the economic incentive to invest in appropriate security measures. Since 1996, hardware theft has declined
significantly, and recent security measures adopted by individual firms appear to be very cost-effective. The authors recommend
more such investments and suggest that the largest payoff will come from anticipating what products are most vulnerable and
devising targeted procedures to protect them. In addition, they recommend strengthening collaborative industry-law enforcement
efforts to help track the threat, anticipate targets, and identify and disable stolen property

Misfortunes of war : press and public reactions to civilian deaths in wartime by Eric V Larson(
)16
editions published
between
2006
and
2007
in
English
and held by
2,154 WorldCat member
libraries
worldwide
This research, part of a larger study undertaken for the U.S. Air Force of ways to reduce collateral damage, analyzes press,
public, and leadership reactions to civilian casualty incidents and how these incidents affect media reporting or public support
for military operations. It analyzes U.S. and foreign media and public responses to the 1991 Al Firdos bunker bombing, the
1999 Djakovica convoy and Chinese embassy attacks, the 2002 Afghan wedding party attack, and the 2003 Baghdad marketplace
explosion

Air power as a coercive instrument by Daniel Byman(
)11
editions published
between
1999
and
2000
in
English
and held by
2,129 WorldCat member
libraries
worldwide
Coercion--the use of threatened force to induce an adversary to change its behavior--is a critical function of the U.S. military.
U.S. forces have recently fought in the Balkans, the Persian Gulf, and the Horn of Africa to compel recalcitrant regimes and
warlords to stop repression, abandon weapons programs, permit humanitarian relief, and otherwise modify their actions. Yet
despite its overwhelming military might, the United States often fails to coerce successfully. This report examines the phenomenon
of coercion and how air power can contribute to its success. Three factors increase the likelihood of successful coercion:
(1) the coercer's ability to raise the costs it imposes while denying the adversary the chance to respond (escalation dominance);
(2) an ability to block an adversary's military strategy for victory; and (3) an ability to magnify third-party threats, such
as internal instability or the danger posed by another enemy. Domestic political concerns (such as casualty sensitivity) and
coalition dynamics often constrain coercive operations and impair the achievement of these conditions. Air power can deliver
potent and credible threats that foster the above factors while neutralizing adversary countercoercive moves. When the favorable
factors are absent, however, air power--or any other military instrument--will probably fail to coerce. Policymakers' use
of coercive air power under inauspicious conditions diminishes the chances of using it elsewhere when the prospects of success
would be greater

American public support for U.S. military operations from Mogadishu to Baghdad by Eric V Larson(
)14
editions published
in
2005
in
English
and held by
1,974 WorldCat member
libraries
worldwide
The support of the American public is widely held to be a critical prerequisite for understanding military action abroad.
As shown in this report, however, the absence of support for military operations from a majority of Americans has not hindered
presidents from undertaking those operations in the past, nor does it seems likely to prove much of a barrier in the future.
The purpose of the present study is to describe American public opinion toward wars and other large military operations over
the last decade, to delineate the sources of support and opposition for each war or operation, to identify the principal fault
lines in support, and to illuminate those factors that are consistent predictors of support for and opposition to military
operations

Understanding commanders' information needs for influence operations(
)8
editions published
in
2009
in
English
and held by
1,942 WorldCat member
libraries
worldwide
Documents a study whose goals were to develop an understanding of commanders' information requirements for cultural and other
"soft" factors in order to improve the effectiveness of combined arms operations, and to develop practical ways for commanders
to integrate information and influence operations activities into combined arms planning/assessment in order to increase the
usefulness to ground commanders of such operations

Assessing irregular warfare : a framework for intelligence analysis by Eric V Larson(
)12
editions published
between
2008
and
2009
in
English
and held by
1,661 WorldCat member
libraries
worldwide
Provides an analytic framework and procedure for the intelligence analysis of irregular warfare (IW) environments that can
serve as the basis for IW intelligence curriculum development efforts. Defines IW in terms of two stylized situations: population-centric
(such as counterinsurgency) and counterterrorism. Provides a detailed review of IW-relevant defense policy and strategy documents
and a list of relevant doctrinal publications

New forces at work : industry views critical technologies by Steven W Popper(
)6
editions published
in
1998
in
English
and held by
1,539 WorldCat member
libraries
worldwide
As part of the effort to produce the fourth National Critical Technologies Report, the Office of Science and Technology Policy
in the Executive Office of the President asked a research team from RAND's Critical Technologies Institute, now named Science
and Technology Policy Institute, to engage business and industry leaders explicitly in a discussion of the issue of critical
technologies by gathering private-sector views on what technologies are appropriate to consider under this rubric--and why.
The primary substantive input was elicited through extended, detailed interviews conducted individually, usually with one
firm's senior executive per session, on-site in most cases. The report presents and analyzes interviewees' responses to what
technologies they consider to be critical to their firm or industry; explores the question of what "critical technology" means;
reports interviewees' assessments of the status of U.S. efforts and performance in the areas of technology they deemed critical;
considers the respective roles of industry, universities, and government in contributing to and sustaining the U.S. technology
base; suggests a process whereby the dialogue between government and industry on the public policy issues relating to technology
might be made more integral and informative to the activities of both. The responses of many of the interviewees emphasized
the aspect of technology as process over technology as product. In line with this vision, the authors propose a critical-technologies
review process that would enable wider, more meaningful, and ongoing communication among industry, government, and universities
on technology issues

Foundations of effective influence operations : a framework for enhancing Army capabilities by Eric V Larson(
)9
editions published
in
2009
in
English
and held by
1,264 WorldCat member
libraries
worldwide
The authors aim to assist the U.S. Army in understanding "influence operations," capabilities that may allow the United States
to effectively influence the attitudes and behavior of particular foreign audiences while minimizing or avoiding combat. The
book identifies approaches, methodologies, and tools that may be useful in planning, executing, and assessing influence operations

Considerations for integrating women into closed occupations in U.S. special operations forces by Thomas S Szayna(
)10
editions published
in
2016
in
English
and held by
917 WorldCat member
libraries
worldwide
"The elimination of the Direct Ground Combat Definition and Assignment Rule has opened to women some 15,500 special operations
forces (SOF) positions. A RAND study helped to inform that decision and provides insight into the key factors surrounding
the integration of women into SOF. The integration of women raises issues pertinent to the effectiveness of SOF teams, in
terms of physical standards and ensuring readiness, cohesion, and morale. This report assesses potential challenges to the
integration of women into SOF for unit cohesion and provides analytical support in validating SOF occupational standards for
positions controlled by U.S. Special Operations Command. The report summarizes the history of integration of women into the
U.S. armed forces, reviews the current state of knowledge about cohesion in small units, and discusses the application of
gender-neutral standards to SOF. The report identifies widely agreed-on professional standards for the validation of physically
demanding occupations and assists SOF service components with the application of these standards to SOF occupations. The report
also discusses the primary data -- a survey of SOF personnel and a series of focus group discussions -- collected by the research
team regarding the potential challenges to the integration of women into SOF. The report then presents recommendations regarding
the implementation process of integrating women into SOF"--Back cover

Strategy-policy mismatch : how the U.S. Army can help close gaps in countering weapons of mass destruction by Tim Bonds(
)5
editions published
in
2014
in
English
and held by
587 WorldCat member
libraries
worldwide
Although two successive presidents have determined that weapons of mass destruction (WMD){u2014}particularly nuclear weapons
in the hands of violent extremists{u2014}pose the greatest threat to the American people, and have decided that countering
their proliferation is a top strategic priority, neither administration has made countering WMD a priority when it comes to
allocating budgetary resources to that overarching national mission. In the public domain, little analysis exists that assesses
the capacity and capabilities required by military forces to conduct WMD elimination (WMD-E) operations. As a result, public
discussion of what capabilities the military requires for such operations generally omits or gives short shrift to requirements
for the WMD-E mission. The purpose of this report is to address and analyze those requirements, namely, the ground force capacity
(force size) and capabilities (force structure) needed to accomplish WMD-E missions and tasks. In particular, these analyses
provide an informed description of the types and size of U.S. Army forces required to conduct WMD-E operations in a wide range
of situations

Casualties and consensus : the historical role of casualties in domestic support for U.S. military operations by Eric V Larson(
Book
)4
editions published
in
1996
in
English
and held by
259 WorldCat member
libraries
worldwide
"Casualties and Consensus is a revealing new study of U.S. public opinion on U.S. military operations. Based upon an examination
of U.S. experiences in the Second World War, Korea, Vietnam, the Gulf, Panama, and Somalia, it finds that, contrary to widely
held belief, public support for U.S. military operations does not respond to casualties alone but ultimately reflects a sensible
weighing of ends and means that is greatly influenced by events and conditions on the battlefield and by U.S. political leaders
in Washington." "Casualties and Consensus is an important and insightful discussion of the recurring patterns in the American
public's support for wars and military operations, and seems certain to provoke renewed discussion and debate in U.S. academic,
political and military circles about the prospects for a post-Cold War consensus on the role of force in American foreign
policy."--Jacket

Ambivalent allies? : a study of South Korean attitudes toward the U.S. by Eric V Larson(
Book
)9
editions published
in
2004
in
English
and held by
233 WorldCat member
libraries
worldwide
Have South Korean attitudes toward the United States deteriorated? To answer this question, RAND researchers compiled and
analyzed public opinion data on those attitudes and examined selected periods in U.S.-South Korean relations to identify the
sources of anti-U.S. sentiment. They found evidence of a downturn in favorable sentiment toward the U.S. but also of a more
recent recovery. They recommend ways to improve South Koreans' perceptions of the U.S. and address their long-standing grievances

Defense planning in a decade of change : lessons from the base force, bottom-up review, and quadrennial defense review by Eric V Larson(
Book
)4
editions published
in
2001
in
English
and held by
219 WorldCat member
libraries
worldwide
The end of the Cold War ushered in an era of profound change in the international arena and hence in the policymaking environment
as well. Yet the changes that have characterized the post-Cold War era have often proceeded at different paces and have at
times moved in opposing directions, placing unprecedented strain on policymakers seeking to shape a new national security
and military strategy. This report describes the challenges policymakers have faced as seen through the lens of the three
major force structure reviews that have taken place over the past decade: the 1990 Base Force, the 1993 Bottom-Up Review,
and the 1997 Quadrennial Defense Review. The report focuses on the assumptions, decisions, and outcomes associated with these
reviews as well as the planning and execution of each. It concludes that all three reviews fell short of fully apprehending
the demands of the emerging threat environment, and the budgets that would be needed and afforded, resulting in a growing
imbalance between strategy, forces, and resources over the decade. Accordingly, the report recommends that future defense
planners adopt an assumption-based approach in which key planning assumptions are continually reassessed with a view toward
recognizing -- and rapidly responding to -- emerging gaps and shortfalls

Building a new foundation for innovation : results of a workshop for the National Science Foundation by Eric V Larson(
Book
)8
editions published
between
2001
and
2002
in
English
and held by
193 WorldCat member
libraries
worldwide
This study reports the efforts of a workshop to buildpartnerships between universities, industry, and governments. In 2000,
the National Science Foundation (NSF) created the Partnerships for Innovation (PFI) program. The PFI is part of a larger NSF
effort to build anew foundation for innovation based upon partnerships between university, industry, and local and regional
governments that also will be responsive toemerging economic and social challenges facing the nation. In June 2001, a workshop
held in Arlington, Virginia, brought together PFI grantees andrepresentatives from university and industry to consider the
roles of thePFI and the NSF in the larger national innovation enterprise. This reportsynthesizes workshop discussions regarding
innovation and sustainablepartnerships. The workshop revealed strong support for a formal evaluationof the PFI program and
endorsed both an expanded NSF role in promotinginnovation and partnerships through the PFI and other programs and continued
efforts by NSF to further diversify and better exploit synergies between its innovation-supporting programs

The decisionmaking context in the U.S. Department of the Navy : a primer for cost analysts by Eric V Larson(
Book
)8
editions published
in
1994
in
English
and held by
166 WorldCat member
libraries
worldwide
This report provides the cost analyst with an introduction to the Department of the Navy and focuses on those characteristics
that are most important to understanding the DON's two major resource-allocation processes: budgeting (reflected in its Planning,
Programming, and Budgeting System (PPBS) process), and Research, Development and Acquisition (RDA). The report describes and
identifies the most important elements of the DON's executive structure, operating forces, and shore establishment, including
the administrative and operational organizations; identifies and describes force structure and major force building blocks
and equipment; identifies the principal actors, fora, decisions, and activities within the PPBS and RDA processes; and discusses
nomenclature, reporting mechanisms, and coding schemes that are critical to understanding resource allocation within the DON

Interoperability of U.S. and NATO allied Air Forces : supporting data and case studies(
Book
)7
editions published
in
2003
in
English
and held by
166 WorldCat member
libraries
worldwide
The United States is increasingly participating in coalition military operations. Coalition support may be required for successful
military operations and in most such operations the United States desires to share the burden. U.S. allies recognize the increased
security that coalition operations can bring. Because interoperability is a key element in coalitions, RAND undertook research
to help the Air Force identify potential interoperability problems that may arise in coalition air operations and to suggest
nonmateriel and technology-based solutions. The research focus is on command, control, communications, intelligence, surveillance,
and reconnaissance (C3ISR) systems in out-of-NATO-area operations. The authors' review of recent coalition air operations
found that interoperability problems arose because of differences in doctrine, incompatible communications, different planning
and execution systems, and different weapon system capabilities. For example, allies may lack sufficient all-weather, day
and night precision-guided weapons. The authors suggest the following to increase interoperability in coalition operations:
(1) common or harmonized doctrine for combined joint task force operations, from planning through assessment, (2) compatible
or adaptable concepts of operation for airborne surveillance and control, (3) common information-sharing standards and compatible
tactical communication systems, and (4) expert, experienced personnel who understand the capabilities of coalition partners.
From a technology perspective and cost considerations, C3ISR initiatives appear to offer the best opportunities for interoperability
enhancements

A new methodology for assessing multilayer missile defense options by Eric V Larson(
Book
)4
editions published
in
1994
in
English
and held by
163 WorldCat member
libraries
worldwide
Iraqi Saud missile attacks during the Persian Gulf War dramatized U.S. vulnerability to theater ballistic (and potentially,
cruise) missiles and illustrated all too clearly the threat of large-scale casualties to U.S. and allied forces posed proliferating
weapons of mass destruction around the world. The presence of these weapons could serve as a strong deterrent on U.S. actions,
and could serve result in constraining U.S. forces from achieving their objectives in regional

Assuring access in key strategic regions : toward a long-term strategy(
Book
)7
editions published
in
2004
in
English
and held by
158 WorldCat member
libraries
worldwide
The Army cannot effectively project power if it cannot get to where it needs to go to confront future adversaries. The authors
of this report developed scenarios and conducted political-military games to determine what strategies, tactics, and capabilities
potential adversaries might use to prevent or complicate U.S. access to key areas and how effective the U.S. counters to these
tactics are. After their assessment, the authors were reasonably sanguine about the ability of the U.S. to prevail in the
near term, but they also identified areas of future concern and suggested several improvements, including expanding the number
of in-theater bases that might be available; enhancing the flexibility and deployability of U.S. forces to more austere bases;
and upgrading detection, warning, and force protection measures

Futures intelligence : assessing intelligence support to three Army long-range planning communities by John E Peters(
Book
)5
editions published
in
1998
in
English
and held by
158 WorldCat member
libraries
worldwide
This report examines the intelligence needs of three groups of Army long-range planners--strategic planners, force developers,
and acquisition--and considers the potential of Army intelligence to satisfy these needs. Data collected from interviews,
workshops, and case studies discovered disparities in expectations and capabilities that collectively constitute cultural
differences between intelligence officers and planners, and that make it difficult for Army intelligence to render fully satisfactory
support to long-range planners. The authors recommend specific actions by the Office of the Deputy Chief of Staff for Intelligence
to address Army intelligence's main shortcomings in supporting long-range planning. Sustained interaction of the Army's intelligence
experts with its customers will improve the quality of support. Communications technology plays a role here, but the more
important task is to make sure that Army intelligence continues to develop high-quality experts with sound reputations among
Army planners and in the intelligence field